Cisco 400-007 Practice Test - Questions Answers, Page 17
List of questions
Related questions
When an SDN-based model is used to transmit multimedia traffic, which aspect should an architect consider while designing the network?
QoE estimation
security
traffic patterns
flow forwarding
Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model:
• hardware sizing and power consumption
• Layer 2 and layer 3 services parameters
• configuration of all control plane protocols
Input from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above. What impact will it have on documentation and project deliverables if the stakeholders ask to have changes carried out in the network before the information has been captured?
This provides more opportunity to think outside the box.
Rework is expected before the delivery.
Significant effort and time are required.
This provides a flexible approach to incorporate changes.
A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?
Enforce risk-based and adaptive access policies.
Assess real-time security health of devices.
Apply a context-based network access control policy for users.
Ensure trustworthiness of devices.
A product manufacturing organization is integrating cloud services into their IT solution The IT team is working on the preparation phase of the implementation approach, which includes the Define Strategy step. This step defines the scope of IT, the application, and the service What is one topic that should be considered in the Define Strategy step?
financial and governance models
innovate and align with business according to volume
due diligence and financial scenarios
contingency exit strategy steps
During evaluation of migrating current on premises infrastructure to add cloud-based infrastructure, a network planning team must meet three core requirements as they make recommendations on which cloud strategy to adopt going forward
• Technology is changing rapidly, therefore the enterprise must be open to adopting new ways of doing things, and be ready to invest CapEx-funds in the next three years
• Network bandwidth capacity requirements are dynamic and are expected to change over the next year
• If new technologies are to be introduced, operational expenses must be kept at a minimum. Which cloud strategy meets these requirements?
private
hybrid
public
multicloud
Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection Which technology meets the updated requirements and can be incorporated into the design?
routed firewall
VLAN ACLs on the switch
transparent firewall
zone-based firewall on the Layer 3 device
Hybrid cloud computing allows organizations to like advantage of public and private cloud models Which best practice should organizations follow to ensure data security in the private cloud?
Use standard protocols for data transmission over the network.
Encrypt data when it is at rest and in motion
Communicate all data security risks to customers and end users.
Use standard network protocols for data communication between unsecured network connections.
A financial company requires that a custom TCP-based stock-trading application be prioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades.
Which directive should be followed when a QoS strategy is developed for the business?
Allow VoIP and the custom application to share the same priority queue,
The custom application and VoIP must be assigned their own separate priority queue.
Interleave the custom application with other TCP applications in the same CBWR
Avoid placing the custom application in a CBWFQ queue that contains other
An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol A spoke-to-spoke 'J<ita propagation model must be set up Which two design considerations must be taken into account? (Choose two )
Configure all the sites as network type broadcast
The network type on all sites should be point-to-multipoint
The network type should be point-to-multipoint for the hub and point-to-point for the spokes.
The hub should be set as the DR by specifying the priority to 255.
The hub should be the DR by changing the priority of the spokes to 0.
Which two characteristics are associated with 802 1s? (Choose two)
802.1s supports up to 1024 instances of 802.1
802.1 s is a Cisco enhancement to 802.1w.
802.1s provides for faster convergence over 802 1D and PVST+.
CPU and memory requirements are the highest of all spanning-tree STP implementations.
802.1s maps multiple VLANs to the same spanning-tree instance
Question